全文获取类型
收费全文 | 244篇 |
免费 | 11篇 |
出版年
2021年 | 8篇 |
2019年 | 3篇 |
2018年 | 6篇 |
2017年 | 7篇 |
2016年 | 8篇 |
2015年 | 5篇 |
2014年 | 8篇 |
2013年 | 43篇 |
2012年 | 4篇 |
2010年 | 3篇 |
2009年 | 11篇 |
2008年 | 3篇 |
2007年 | 5篇 |
2006年 | 2篇 |
2005年 | 2篇 |
2004年 | 6篇 |
2003年 | 3篇 |
2002年 | 7篇 |
2001年 | 5篇 |
2000年 | 4篇 |
1999年 | 2篇 |
1998年 | 3篇 |
1997年 | 3篇 |
1996年 | 2篇 |
1995年 | 7篇 |
1994年 | 2篇 |
1993年 | 3篇 |
1992年 | 3篇 |
1991年 | 6篇 |
1990年 | 4篇 |
1989年 | 5篇 |
1988年 | 6篇 |
1987年 | 6篇 |
1986年 | 5篇 |
1984年 | 5篇 |
1983年 | 3篇 |
1982年 | 2篇 |
1981年 | 4篇 |
1980年 | 3篇 |
1979年 | 3篇 |
1978年 | 4篇 |
1977年 | 5篇 |
1975年 | 2篇 |
1974年 | 2篇 |
1973年 | 4篇 |
1972年 | 2篇 |
1971年 | 2篇 |
1970年 | 2篇 |
1969年 | 3篇 |
1968年 | 2篇 |
排序方式: 共有255条查询结果,搜索用时 15 毫秒
151.
Gülay Günlük-Senesen 《Defence and Peace Economics》2013,24(5):385-403
This paper investigates the budgetary trade-off structure of security (defence+internal security) expenditures in Turkey for the period 1983-1998. A modified version of Todaro's distributive share index of social welfare is used to quantify the impacts on the growth of primary budget expenditures of Security, Education, Health, General Administration, Infrastructure, and Social Services. We find that defence expenditures dominate overall security expenditures and are less affected in times of bottlenecks in the economy. A systematic pattern of negative budgetary trade-offs of security expenditures in terms of other components is not identified. We also analyse the expenditures of the Defence Industry Support Fund in an attempt to find the cost of the modernisation program to the economy. 相似文献
152.
Tilman Brück 《Defence and Peace Economics》2013,24(5):375-389
This paper analyses public policy choices in the security economy from an economic perspective. It discusses the role of public goods for national and global security and identifies the importance of the first‐ and second‐order indirect effects of insecurity on economic activity, which include the behavioural responses of agents and the government to security measures, akin to such effects in insurance economics. Furthermore, key public policy trade‐offs are outlined, in particular between security and efficiency, globalisation, equity and freedom. The analysis identifies suitable policy options for raising security in the national and international contexts and in view of these trade‐offs. A balance between market and non‐market instruments in achieving security should be aimed for in order to minimise the adverse effects of aiming for higher security. In addition, the public good nature of security implies that international coordination of security policies is important, despite this process being fraught with enforcement problems. 相似文献
153.
154.
155.
156.
Loch K. Johnson ? 《The Nonproliferation Review》2013,20(1):111-118
Spying on the Nuclear Bear: Anglo-American Intelligence and the Soviet Bomb, by Michael S. Goodman. Stanford University Press, 2007. 295 pages, $50. 相似文献
157.
A mathematical formulation and efficient heuristics for the dynamic container relocation problem
下载免费PDF全文
![点击此处可从《海军后勤学研究》网站下载免费的PDF全文](/ch/ext_images/free.gif)
The container relocation problem (CRP) is concerned with emptying a single yard‐bay which contains J containers each following a given pickup order so as to minimize the total number of relocations made during their retrieval process. The CRP can be modeled as a binary integer programming (IP) problem and is known to be NP‐hard. In this work, we focus on an extension of the CRP to the case where containers are both received and retrieved from a single yard‐bay, and call it the dynamic container relocation problem. The arrival (departure) sequences of containers to (from) the yard‐bay is assumed to be known a priori. A binary IP formulation is presented for the problem. Then, we propose three types of heuristic methods: index based heuristics, heuristics using the binary IP formulation, and a beam search heuristic. Computational experiments are performed on an extensive set of randomly generated test instances. Our results show that beam search heuristic is very efficient and performs better than the other heuristic methods.Copyright © 2014 Wiley Periodicals, Inc. Naval Research Logistics 61: 101–118, 2014 相似文献
158.
For nonnegative integers d1, d2, and L(d1, d2)‐labeling of a graph G, is a function f : V(G) → {0, 1, 2, …} such that |f(u) − f(v)| ≥ di whenever the distance between u and v is i in G, for i = 1, 2. The L(d1, d2)‐number of G, λ(G) is the smallest k such that there exists an L(d1, d2)‐labeling with the largest label k. These labelings have an application to a computer code assignment problem. The task is to assign integer “control codes” to a network of computer stations with distance restrictions, which allow d1 ≤ d2. In this article, we will study the labelings with (d1, d2) ∈ {(0, 1), (1, 1), (1, 2)}. © 2004 Wiley Periodicals, Inc. Naval Research Logistics, 2005 相似文献
159.
160.